December 8, 2025 at 12:49PM

Below is the exact list of CVEs publicly attributed to Intellexa / Cytrox / Predator by Apple, Google TAG, Citizen Lab, Amnesty, and other confirmed research.

✅ Confirmed Predator / Intellexa Exploit CVEs (OSINT-verified)

iOS Zero-days

These were confirmed by Apple + Citizen Lab as Predator delivery vectors:

2021–2023 chains

CVE-2023-41991 – Certificate validation bypass.

CVE-2023-41992 – Kernel privilege escalation.

CVE-2023-41993 – WebKit RCE.
(Used together as a chain in 2023 Predator ops)

2021 forcedentry-successor

CVE-2021-30860 – CoreGraphics integer overflow (image/PDF parsing).
(Originally linked to NSO, later reused by several vendors including Intellexa clusters)

2023 iOS 16 chain from Google TAG (linked to Cytrox/Predator)

CVE-2023-32434 – Kernel memory corruption.

CVE-2023-32435 – WebKit memory corruption.

CVE-2023-32439 – WebKit type confusion (JIT exploit).
(TAG attributed these to “commercial spyware vendors including Cytrox”)

Android Zero-days (Predator delivery vectors)

Google confirmed these were exploited in the wild by Intellexa/Cytrox customers.

2021–2022 Predator loader chain

CVE-2021-1048 – Binder kernel bug (priv-esc).

CVE-2021-0920 – Kernel use-after-free (priv-esc).

CVE-2021-39793 – System component privilege escalation.

CVE-2021-1049 – Another binder-based memory corruption.
(Used to escape sandbox and plant Predator “Alien” loader)

Chrome-based

CVE-2022-2294 – WebRTC heap overflow (RCE → Predator dropper).
(Google TAG directly attributed this exploit to Intellexa/Cytrox in July 2022)

Chrome / Browser Zero-days

These were part of Predator delivery flows identified by TAG:

CVE-2021-30551 – V8 type confusion (sandbox escape).

CVE-2021-21166 – V8 object lifecycle issue (RCE).
(Used by multiple spyware vendors; TAG mapped infrastructure to Predator cluster)

Windows Predator Infrastructure Bugs (not exploit chain)

Not used for infection, but found on Predator servers:

CVE-2023-23397 – Outlook NTLM leak (used in lateral movement observed in a Predator operator’s infra; not for mobile exploitation).
(OSINT from DFIR reports on Predator operator servers)

✅ OSINT-Confirmed Techniques (non-CVE)

1. Aladdin – ad-delivery exploit system

Confirmed publicly by Amnesty (Dec 2025 leak).
Technique: Abuse of ad-network JavaScript → exploit chain delivery → Predator loader.

2. Alien loader

Publicly documented by Google TAG.
Role: first-stage memory-only agent → executes Predator module after sandbox escape.

3. Chromium → Kernel pivot

Google TAG reported this exact operational sequence in 2022 Predator cases:

Chrome RCE → renderer escape → binder kernel PE → Predator drop.

4. WebKit → AMFI bypass → kernel PE

Seen in the 2023 iOS chain (41991+41992+41993).

✅ Summary

Predator uses verified CVE chains involving:

iOS: CVE-2023-41991/41992/41993 + older 30860

Android: CVE-2021-1048/1049, CVE-2021-0920, CVE-2021-39793

Chrome: CVE-2022-2294, CVE-2021-30551, CVE-2021-21166

Delivery: Aladdin ad-network zero-click (non-CVE technique)

Loader: Alien (Google-confirmed)